| Issue | Title | |
| Vol 8, No 3 (2007) | An Optimal MILP Formulation for the Delay-and Delay Variation-Bounded Multicast Tree Problem | Abstract |
| Pi-Rong Sheu, Hung-Yuan Tsai, Shao-Chi Chen | ||
| Vol 21, No 1 (2020) | An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X) | Abstract PDF |
| Vishal Sharma, Jiyoon Kim, Yongho Ko, Ilsun You, Jung Taek Seo | ||
| Vol 12, No 5 (2011) | An Optimization Method for Sequence Event Detection | Abstract |
| Yuanping Li, Jun Wang, Ling Feng, Wenwei Xue | ||
| Vol 17, No 3 (2016) | An Optimization Scheduling Approach for Cloud Computing | Abstract |
| Chih-Yung Chen, Jih-Fu Tu, Chien-Min Ou | ||
| Vol 26, No 7 (2025) | An Optimized Feature Matching Method Based on Rolling Guided Filter Constrains | Abstract |
| Xiaomin Liu, Yizhao Yuan, Donghua Yuan, Jeng-Shyang Pan, Huaqi Zhao | ||
| Vol 16, No 5 (2015) | An Optimized LBS Technology for In-Hospital Environment | Abstract |
| Telung Pan, Ting-Cheng Chang | ||
| Vol 18, No 6 (2017) | An Outsourcing Data Storage Scheme Based on Digital Watermarking | Abstract |
| Zhangjie Fu, Lili Xia, Xingming Sun, Jiashuang Xu | ||
| Vol 5, No 4 (2004) | An Overlay Scheme for Live Streaming Media Distribution Using Minimum Spanning Tree Properties | Abstract |
| Y. Despotopoulos, Ch. Patrikakis, P. Fafali, N. Minogiannis, A. Anagnostou | ||
| Vol 4, No 4 (2003) | An Overview of Mobile Commerce Security | Abstract |
| David Taniar, Ian Ng, J. Wenny Rahayu | ||
| Vol 27, No 1 (2026) | An R-based System Implementation for Automated Threat Intelligence Analysis Integrating Text Mining and Machine Learning | Abstract |
| Hung-Cheng Yang, I-Long Lin, Yu-Shan Lin, Chorng-Ming Chen | ||
| Vol 15, No 5 (2014) | An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard | Abstract |
| Tsung-I Chuang, Wei-Ning Yang, Nai-Wei Lo | ||
| Vol 17, No 7 (2016) | An RR Intervals Based Arousal Level Index for Emotional IoT | Abstract |
| Zhaofang Yang, Guangyuan Liu | ||
| Vol 26, No 6 (2025) | An SDN System for Intelligent Botnet Behavior Suppression | Abstract |
| Shih-Chen Wang, Yi-Chen Lee, Wei-Che Chien, Guanling Lee, Sheng-Lung Peng | ||
| Vol 16, No 3 (2015) | An SOA-Based System Modeling Methodology | Abstract |
| Tao-Ku Chang, Elliott T. Y. Hwang | ||
| Vol 12, No 3 (2011) | An Ubiquitous Sleep Quality Monitoring and Evaluation | Abstract |
| Jing-Zhi Yan, Bin Hu, Hong Peng, Hao-Yu Ma, Wen Zhao | ||
| Vol 13, No 4 (2012) | An Unconnected Clustering Negotiation Policy for a Distribution Cognitive Network | Abstract |
| Lian-Fen Huang, Zi-long Gao, Yi-fei Zhao, Jing Wang, Chi-Hsiang Lo | ||
| Vol 16, No 6 (2015) | An Unequal Cluster-Based Routing Protocol for Wireless Heterogeneous Sensor Networks | Abstract |
| Jin-Fang Jiang, Guang-Jie Han, Li Liu, Xu Jiang, Jian-Feng Huang | ||
| Vol 20, No 2 (2019) | An Unknown Attack Detection Scheme Based on Semi-supervised Learning and Information Gain Ratio | Abstract PDF |
| Meng-Fan Xu, Xing-Hua Li, Mei-Xia Miao, Cheng Zhong, Jian-Feng Ma | ||
| Vol 16, No 4 (2015) | Analysis of File Pollution in P2P Networks with Epidemic Model | Abstract |
| Zhong-Wen Li, Kuan-Ching Li, Yi Xie, Hai Jiang, Liang Shi | ||
| Vol 17, No 7 (2016) | Analysis of Hierarchical Addressing in Different Deployment Ways | Abstract |
| Xuan Lu, Wendong Wang, Xiangyang Gong, Xirong Que, Bai Wang | ||
| Vol 3, No 4 (2002) | Analysis of Parallel Query Processing Algorithms for Semi-structured Data | Abstract |
| Wenjun Sun, Kevin Lu | ||
| Vol 26, No 1 (2025) | Analysis of Product Selection Strategy for Cross-Border E-Commerce with Assistance of Artificial Intelligence | Abstract |
| Lin Feng | ||
| Vol 25, No 3 (2024) | Analysis of Reading Behavior Based on Students’ Cognitive Styles and Learning Styles | Abstract |
| Juan Zhou, Hideyuki Takada, Chengjiu Yin | ||
| Vol 16, No 3 (2015) | Analysis of SCTP Concurrent Multipath Transfer in Vehicular Network Communication | Abstract |
| Jing-Yi Gan, Neal Naixue Xiong, Hui-Min Wen, Qing-Zhen Zhu | ||
| Vol 21, No 4 (2020) | Analysis of the New Method for Assessing the Total Network Capacity of Wireless Mesh Networks for IoT Devices | Abstract PDF |
| El Miloud Ar-Reyouchi | ||
| 726 - 750 of 2743 Items | << < 25 26 27 28 29 30 31 32 33 34 > >> | |
